On Tue, 26 Feb 2002, Steve Holmes wrote:
> I know, but as soon as I make default policy to DENY on the input chain,
> all connectivity to the outside is lost. Here was a basic set of rules at
> my last test.
> ipchains -P input DENY
> ipchains -A input -i lo -j ACCEPT
> ipchains -A input -i eth0 -j ACCEPT
> ipchains -P forward DENY
> ipchains -A forward -s 192.168.1.0/24 -j MASQ
> ipchains -P output -j ACCEPT
> Now at this point I tried adding something like
> ipchains -A input -i eth1 -p ! -y --dport 1025:65535 -j ACCEPT
Upon further thinking following a later response I *think* that you need
to add tcp after the -p.
ipchains -A input -i eth1 -p tcp ! -y --dport 1025:65535 -j ACCEPT
It has been a while since I messed with ipchains. I was forced (my
own fault) to upgrade to iptables after a kernel recompile. Tables, IMO,
is far easier to configure once you get your mind wrapped around the
changes. I have far fewer rules, tables is stateful and works beautifully.
--
Patrick Fleming, EA
Licensed to represent taxpayers
before Exam, Appeals, and Conference
divisions of the IRS